IT professionals are tired of hearing that the growth of unstructured data is out of control. While attempting to curtail its growth is a noble cause, what IT really needs is the ability to control and manage it. Gaining control…
IT professionals are tired of hearing that the growth of unstructured data is out of control. While attempting to curtail its growth is a noble cause, what IT really needs is the ability to control and manage it. Gaining control…
Object storage is the storage methodology for the future of unstructured data and more. Next generation applications are able to write directly to object storage and take advantage of its sophisticated resource management capabilities. But enterprises have unstructured data problems…
The reason that file data is a prime target of ransomware attacks is that most file servers are full of juicy targets that organizations are willing to pay to get back. Payment is, after all, exactly what ransomware is all…
IT needs a proactive way to stop ransomware. It’s here to stay. Most ransomware countermeasures are reactive. The damage is done before IT can deploy their reactive countermeasures. When ransomware gets through an organization’s defenses, it starts to encrypt data,…
NTP Software Defendex™ Product Analysis Ransomware is, for good reason, top of mind right now. Most strategies under discussion now are actually responses, not analysis and elimination. And, because ransomware is such a profitable “business,” new versions will continue to…
When IT defenses are compromised, the organization faces one of two challenges. Either the data is encrypted by a ransomware attack or it is copied to the attacker’s servers. In the first case, assuming data protection is in place and…
Even if archive storage was the same price as primary storage, you’d still want to archive. While most in IT look at archiving as a way to reduce the cost of primary storage there is a lot more to it…